Skip to main content

Full text of "USPTO Patents Application 09870801"

See other formats


Copy tor Adminktraft^ Patent Judge 


Patent ^? 
Attorney's Docket No. 032406-002 


IN THE UNITED STATES PATENT AND TRADEMARK OFFICE 



In re Patent Application of 

Karl L. GINTER, et al. 

Application No. : 09/4 1 1 ,205 

Filed: October 4, 1999 

For: SYSTEMS AND METHODS FOR 
SECURE TRANSACTION 
MANAGEMENT AND ELECTRONIC 
RIGHTS PROTECTION 


Group An U„i, :2171 RECE|VE[) 

Examiner: Von Buhr, M. JAN 2 6 2001 

Technology Center 2100 



AMENDMENT AND REQUEST FOR INTERFERENCE :' 

Assistant Commissioner for Patents 7 
Washington, D.C. 20231 - 

Sir: 

In response to the Office Action dated December 19, 2000, please amend the above- 
identified application as follows: 
IN THE SPECIFICATION : 

On page 1, before the heading "Field(s) of the Invention(s)," insert the following 
aragraph: 

This application is a continuation of Application No. 09/208,017 filed December 


f 1<#9, which is a continuation of Application No. 08/388,107 filed February 13, 1995, 


now abandoned 


Attorney Docket No. 032406-002 
Application No. 09/411.20^ 


IN THE CI .AIMS - 

Please candd claims 1-90 of the application as originally filed and add new claims 
91-148 as follows: 


-91 . A method for managing a data object so as to comply with control conditions 
for usage of the data object, comprising the steps of: 

storing the data object in a memory device, where it is accessible by means of a 
data object provider's data processor; 

providing a variable number of control conditions for usage of the data object; 
creating, by said data processor, a general set of control data for the data object 
based on said variable number of control conditions for usage, said general set of control 
data comprising at least one or more usage control elements defining usages of 
the data object which comply with said variable number of control conditions, 

storing said general set of control data in a memory device, where it is 
accessible by said data processor; 

concatenating the general set of control data with a copy of the data object; and 
encrypting at least the copy of the data object and said one or more usage 
control elements to create a secure data package which is ready for transfer to a user. 

92. A method as set forth in claim 91, wherein the step of encrypting comprises 
encrypting the data object and the general set of control data. 


-2- 


Attorney Docket No. 032406-002 
Application No. 09/411.205 

93. A method as set forth in claim 91 , wherein the step of creating control data 
comprises creating an identifier which uniquely identifies the general set of control data. 

94. A method as set forth in claim 91 , wherein the step of creating a general set of 
control data comprises creating a security control element which identifies a security 
process to be applied before usage of the data object is allowed. 

95. A method as set forth in claim 91 , wherein the step of creating a general set of 
control data comprises creating a format control element which identifies the format of the 
control data. 

96. A method as set forth in claim 91, further comprising the steps of receiving in 
said data processor a request for authorization for usage by a user; comparing the usage for 
which authorization is requested with said one or more usage control elements of the 
general set of control data and granting the authorization if the usage for which 
authorization is requested complies with the usages defined by said one or more usage 
control elements. 

97. A method as set forth in claim 96, further comprising the step of securing 
payment for the requested authorization for usage before granting the authorization. 


-3- 


Attorney Docket No. 032406-007 
Application No. 09/41 1.20S 


98. A method as set forth in claim 91 , comprising the further steps of: 
receiving the data package in a user's data processor; 

storing the data package in a memory device where it is accessible by means of 
the user's data processor; 

decrypting said one or more usage control elements; 
checking, in response to a request by the user for usage of the data object, 
whether the requested usage complies with the usage defined by the at least one usage 
control element of the general set of control data; 

decrypting, in response to the requested usage complying with the usage defined 
by the at least one usage control element of the general set of control data, the data object 
and enabling the requested usage, otherwise disabling it. 

99. A method as set forth in claim 98, comprising the further steps of 
^concatenating, after the usage of the data object, the data object and the one or more 
usage control elements, reencrypting at least the data object and the one or more usage 
control elements, and storing the thus-repackaged data package in the memory of the user's 

data processor. 


100. A method for controlling the usage by a user of a data object so as to comply 
with control conditions for usage of the data object, comprising the steps of: 

providing a variable number of control conditions for usage of the data object; 


- 4 - 


Attorney Docket No. 032406-00? 
Application No. 09/411.205 


storing a data package in a memory device, where it is accessible by means of 
a data processor of the user, said data package comprising the data object and control data, 
which comprises at leas, one usage control element defining a usage of the data object 
which complies with the variable number of control conditions, the data object and said at 
least one usage control element being encrypted; 

receiving a request by the user for usage of the data object; 

decrypting the control data; 

checking, in response to the request by the user for usage of the data object, 
whether the requested usage complies with the usage defined by the at least one usage 
control element of the control data; and 

decrypting, in response to the requested usage complying with the usage 
defined by the at least one usage control element of the control data, the data object and 
enabling the requested usage, otherwise disabling it. 

101. A method as set forth in claim 100, wherein the usage control element is 
updated after the at least one usage of the data object. 

102. A method as set forth in claim 100, wherein said control data comprises an 
indication of the number of times the user is authorized to use the data object in accordance 
with said at least one usage control element; 


-5 - 


Attorney Docket No. 032406-002 
Application No. 09/41 1.20S 


wherein the requested usage of the data object is only enabled when said 
number of times is one or more; and 

wherein said number of times is decremented by one when the requested usage 

is enabled. 


103. A method as set forth in claim 100, wherein the control data comprise a 
security control element, and further comprising the step of carrying out, before each usage 
of the data object, a security procedure defined in the security control element. 

104. A method as set forth in claim 100, wherein the step of checking whether the 
requested usage complies with the usage defined by the at least one usage control element 
comprises the step of checking that the user's data processor is capable of carrying out a 
security procedure specified in a security control element of the at least one usage control 
element, and if not, disabling the usage. 

105. A method as set forth in claim 100, comprising the further steps of 
reconcatenating, after the usage of the data object, the data object and the one or more 
usage control elements, reencrypting at least the data-object and the one or more usage 
control elements, and storing the thus-repackaged data package in the memory of the user's 
data processor. 


-6- 


Attorney Docket No. 032406-00? 
Application No. 09/41 i .2Q S 


106. A system for managing a data object so as to comply with control conditions 
for usage of the data object, comprising means for providing a variable number of control 

conditions; 

first means in the data object provider's data processor for creating a general 
set of control data for the data object based on the variable number of control conditions 
for usage, said general set of control data comprising at least one or more usage 
control Cements defining usages of the data object which comply with the variable number 
of control conditions; 

storing means, which are accessible by means of said data processor, for 
storing the data object and the general set of control 
data; 

concatenating means for concatenating the general set of control data with a 
copy of the data object; and 

encrypting means for encrypting the copy of the data object and at least said 
one or more usage control elements to create a secure data package, which is ready for 
transfer to a user. 

107. A system as se, forth in data 106, wherein the genera] se. of comrol data 
comprises a conrro! data Cement which defines the right to ftaher distribution of the data 
object by the user. 


- 7 - 


Attorney Docket No. 032406-009 
Application No. 09/411. 70S 


108. A system for controlling the usage by a user of a data object so as to comply 
with control conditions for usage of the data object, comprising: 

means for providing variable number of control conditions; 
storing means for storing a data package which comprises a data object and a 
control data comprising at least one usage control element defying a usage of the data 
object which complies with the variable number of control conditions; 

means for decrypting the at least one usage control element and the data 

object; 

checking means for checking whether a usage requested by the user complies 
with the usage defined by said at least one usage control element: 

enabling means for enabling the usage requested by the user when the usage 
complies with the usage defined by said at least one usage control element;, and 

disabling means for disabling the usage requested by the user when the usage 
does not comply with the usage defined by said at least one usage control element. 

109. A system as set forth in claim 108, further comprising means for repackaging 
the data object after usage thereof. 

1 1 0. A method for controlling the usage by a user of data objects so as to comply 
with predetermined conditions for usage of the data objects, comprising the steps of: 


Attorney Docket No. 032406-00? 
Application No. 09/411 .205 


storing at least two data packages in a memory device, where they are 
accessible by a data processor of the user, each said data package comprising a data object 
and a user set of control data, which comprises at least one usage control element defining 
a usage of the data object which complies with the predetermined conditions, the data 
object and said at least one usage control elements being encrypted; 

decrypting the usage control elements of the user sets of control data; 

examining the usage control elements of said at least two data packages to find 

a match; 

using, in response to the finding of a match, the data processor to carry out an 
action, which is specified in the user sets of control data. 

1 H . A method as set forth in claim 1 10, comprising the further steps of updating 
the at least one usage control element of each data package, concatenating after the usage 
of the data objects, each of the data objects and its at least one usage control element, 
reencrypting each of the concatenated data objects and its at least one usage control element 
and transferring the repackaged data objects to their creators. 

1 12. A method for managing a data object so as to comply with predetermined 
conditions for usage of the data object, comprising the steps of: 

storing the data object in a memory device, where it is accessible by means of 
a data object provider's data processor; 

-9- 


Attorney Docket No. 032406-007 
Application No. 09/41 1.20S 


providing control conditions for usage of the data object; 
creating, by said data processor, a generals* of control data for the data 
object based on said control conditions for usage, said general set of control data 
comprising at least one or more usage control elements defining usages of the data object 
which comply with said control conditions; 

storing said general set of control data in a memory device, where it is 
accessible by said data processor; 

concatenating the general set of control data with a copy of the data object; 
encrypting at least the copy of the data object and said one or more usage 
control elements to create a secure data package which is ready for transfer to a user; 

creating, in response to a request for authorization for usage of the data object 
by a user, a user set of control data, which comprises at least a subset of the general set of 
control data, including at least one of said usage control elements; 

using the user set of control data instead of the general set of control data in 
said concatenating step; 

using the at least one or more usage control element of the user set of control 
data instead of the one or more usage control elements of the general set of control data in 
the encrypting step; and 

checking, before allowing transfer of the data package to the user, that said 
request for authorization for usage of the data object has been granted. 


- 10- 


Attorney Docket No. 03240fi-On? 
Application No. 09/411.20*; 


113. A method as set forth in claim 112, wherein the data object is composed of at 
least two constituent data objects and wherein the user set of control data, in response to a 
request for authorization for usage of one of said constituent data objects by a user, is 
created only for that constituent data object and concatenated only with a copy of that 
constituent data object. 

1 14. A method as set forth in claim 112, wherein the data provider's data processor 
is connected to a data network and the request for authorization is received from a data 
processor of the user, which is also connected to the data network, further comprising the 
step of transferring the data package through the data network to the user's data processor. 

115. A method as set forth in claim 112, wherein the data object is a composite 
data object including at least two constituent data objects and wherein the step of creating a 
general set of control data comprises the step of creating a respective general set of control 
data for each of the constituent data objects and the composite data object and wherein the 
step of creating a user set of control data comprises the step of creating a respective user 
set of control data for each of the constituent data objects and the composite data object. 

116. A method as defined in claim 1 12, comprising the further step of storing a 
copy of the user set of control data in the data object provider's processor. 


-11 - 



Attorney Docket No. 032406-002 
Application No. 09/411.20^ 

1 17. A method as defined in claim 1 12, comprising the further steps of: 
receiving the data package in a user's data processor; 
storing the data package in a memory device where it is accessible by means 
of the user's data processor; 

decrypting the at least one usage control element of the user set of control 

data; 

checking, in response to a request by the user for usage of the data object, 
whether the requested usage complies with the usage defined by the at least one usage 
control element of the user set of control data; and 

decrypting, in response to the requested usage complying with the usage 
defined by the at least one usage control element of the user set of control data, the data 
object and enabling the requested usage, otherwise disabling it. 


118. A method as set forth in claim 112, further comprising: 
receiving the data package in a user's data processor; 
storing the data package in a memory device where it is accessible by mes 
of the user's data processor; 

decrypting the at least one usage control element of the user set of control 

data; 


- 12- 


Attorney Docket No. 032406-002 
Application No. 09/41 1.205 


checking, in response to a request by the user for usage of the data object, 
whether the requested usage complies with the usage defined by the at least one usage 
control element of the user set of control data; 

decrypting, in response to the requested usage complying with the usage 
defined by the at least one usage control element of the user set of control data, the data 
object and enabling the requested usage, otherwise disabling it; and 

reconcatenating, after the usage of the data object, the data object and the one 
or more usage control elements of the user set of control data, and reencrypting at least the 
data object and the one or more usage of the user set of control data. 

1 19. A system for managing a data object so as to comply with control conditions 
for usage of the data object, comprising: 

first means in the data object provider's data processor for creating a general 
set of control data for the data object based on the predetermined conditions for usage, said 
general set of control data comprising at least one or more usage control elements defining 
usages of the data object which comply with the predetermined conditions; 

storing means, which are accessible by means of said data processor, for 
storing the data object and the general set of control data; 

concatenating means for concatenating the general set of control data with a 
copy of the data object; 


- 13 - 


Attorney Docket No. 0324O6-OO? 
Application No. 09/411.205 


encrypting means for encrypting the copy of the data object and at least said 
one or more usage control elements to create a secure data package, which is ready for 
transfer to a user; 

second means in said data processor for creating, in response to a request for 
authorization for usage of the data object by a user, a user set of control data, which 
comprises at least a subset of the general set of control data, which subset comprises at 
least one of said usage control elements; 

using the user set of control data instead of the general set of control data in 
the storing means; 

using the user set of control data instead of the general set of control data in 
the concatenating means; 

using the user set of control data instead of the general set of control data in 
the encrypting means; and 

checking means in said data processor for checking that said request for 
authorization for usage of the data object has been granted before allowing transfer of the 
data package to the user. 

120. A method for managing an object so as to comply with control conditions for 
usage of the object, comprising the steps of: 

storing the object in a storage device, where it is accessible by means of an 
object provider's electronic appliance; 

- 14 - 


Attorney Docket No. 032406-002 
Application No. 09/411.205 


providing a variable number of control conditions for usage of the object; 
creating, by said electronic appliance, a general set of control data for the 
object based on said variable number of control conditions for usage, said general set of 
control data comprising at least one or more usage control elements defining usages of 
the object which comply with said variable number of control conditions, 

storing said general set of control data in a storage device, where it is 
accessible by said electronic appliance; 

containerizing the general set of control data with a copy of the object; and 
encrypting at least the copy of the object and said one or more usage control 
elements to create a secure container which is ready for transfer to a user. 

121. A method as set forth in claim 120, wherein the step of encrypting comprises 
encrypting the object and the general set of control data. 

122. A method as set forth in claim 120, wherein the step of creating control data 
comprises creating an identifier which uniquely identifies the general set of control data. 

123. A method as set forth in claim 120, wherein the step of creating a general set 
of control data comprises creating a security control element which identifies a security 
process to be applied before usage of the object is allowed. 


- 15 - 


Attorney Docket No. 032406-009 
Application No. 09/411 90S 


set 


124. A method as set forth in claim 120, wherein the step of creating a general 
of control data comprises creating a format control element which identif.es the format of 
the control data. 


125. A method as set forth in claim 120, further comprising the steps of receiving in 
said electronic appliance a request for authorization for usage by a user; comparing the 
usage for which authorization is requested with said one or more usage control elements of 
the general set of control data and granting the authorization if the usage for which 
authorization is requested complies with the usages defined by said one or more usage 
control eJements. 

126. A method as set forth in claim 125, further comprising the step of securing 
payment for the requested authorization for usage before granting the authorization. 

127. A method as set forth in claim 120, comprising the further steps of: 
receiving the container in a user's electronic appliance; 

storing the container in a storage device where it is accessible by means of the 
user's electronic appliance; 

decrypting said one or more usage control elements; 


- 16- 


Attorney Docket No. 032406-0^ 
Application No. 09/411 ?n ,s 


checking, in response to a request by the user for usage of the object, whether 
the requested usage complies with the usage defined by the at least one usage control 
element of the general set of control data; 

decrypting, in response to the requested usage complying with the usage 
defined by the at least one usage control element of the general set of control data, the 
object and enabling the requested usage, otherwise disabling it. 

128. A method as set forth in claim 127, comprising the further steps of 
recontainerizing, after the usage of the object, the object and the one or more usage control 
elements, reencrypting at least the object and the one or more usage control elements, and 
storing the thus-recontainerized container in the storage of the user's electronic appliance. 

129. A method for controlling the usage by a user of an object so as to comply with 
control conditions for usage of the object, comprising the steps of: 

providing a variable number of control conditions for usage of the object; 
storing a container in a storage device, where it is accessible by means of : 
electronic appliance of the user, said container comprising the object and control data, 
which comprises at least one usage control element defining a usage of the object which 
complies with the variable number of control conditions, the object and said at least one 
usage control element being encrypted; 

receiving a request by the user for usage of the object; 


an 


- 17 


Attorney Docket No. 032406-007 
Application No. 09/411 70S 


decrypting the control data; 

checking, in response to the request by the user for usage of the object, 
whether the requested usage complies with the usage defined by the at least one usage 
control element of the control data; and 

decrypting, in response to the requested usage complying with the usage 
defined by the at least one usage control element of the control data, the object and 
enabling the requested usage, otherwise disabling it. 

130. A method as set forth in claim 129, wherein the usage control element is 
updated after the at least one usage of the object. 

131 . A method as set forth in claim 129, wherein said control data comprises an 
indication of the number of times the user is authorized to use the object in accordance 
with said at least one usage control element; 

wherein the requested usage of the object is only enabled when said number of 
times is one or more; and 

wherein said number of times is decremented by one when the requested usage 

is enabled. 


- 18- 


Attorney Docket No. 032406-00? 
Application No. 09/41 1.20S 


132. A method as set forth in claim 129, wherein the control data comprise a 
security control element, and further comprising the step of carrying out, before each usage 
of the object, a security procedure defined in the security control element. 

133. A method as set forth in claim 129, wherein the step of checking whether the 
requested usage complies with the usage defined by the at least one usage control element 
comprises the step of checking that the user's electronic appliance is capable of carrying 
out a security procedure specified in a security control element of the at least one usage 
control element, and if not, disabling the usage. 

134. A method as set forth in claim 129, comprising the further steps of 
^containerizing, after the usage of the object, the object and the one or more usage control 
elements, reencrypting at least the object and the one or more usage control elements, and 
storing the thus-recontainerized container in the storage of the user's electronic appliance. 

135. A system for managing an object so as to comply with control conditions for 
usage of the object, comprising means for providing a variable number of control 
conditions; 

first means in the object provider's electronic appliance for creating a general 
set of control data for the object based on the variable number of control conditions for 
usage, said general set of control data comprising at least one or more usage control 


B0St AVQiloblO CopyAtt 0 i&aMkytobifej vmmsm^m 

AppU^pitoarktofig&il!^ 205 


elements defmingusiage^elute^^^ic^b,^ tte^igthteal^ef o$mW<*xa in 

conditooBBOring means; 

storinsinsjte.in^sbt^a^ 
storirj^tbembj'netiai»%tteegfi8eraI set of control data; 


copytfctf Ajcujlpoag ao^ns; and 


encr^e^i^maferiflii^jB^rtflieqjppfiiAte f^idMrirfg iMtfclftidrgpeer for 


m 


usercontainer to the user.- 

136. A system as set forth in claim 135, wherein the general set of control data 
comprises a control data element which defines the right to further distribution of the 
object by the user. 

137. A system for controlling the usage by a user of an object so as to comply with 
control conditions for usage of the object, comprising: 

means for providing variable number of control conditions; 

storing means for storing a container which comprises an object and a control 
data comprising at least one usage control element defying a usage of the object which 
complies with the variable number of control conditions; 

means for decrypting the at least one usage control element and the object; 

-20^27- 


9 

oesf Available Copy { 


set of <, 


wTtn^u^e 1 a^iny 0 ^ mP&^Md&BBPy^ « leas, the object 

- * e - aoB mahMWrnm** by the user when ^ 

complies with the usage defined by said at least one usage control element; and 

,48 - &sm^Mmism mmm mm®^mm& 

MS^mtm** by said at least one usage control eiemen, 

first means in the object provider's e.ectronic appliance for creating a general 

f^&SS^^SE^^. or more usage control elements defining 
usages of the object which comp.y with the predetermined conditions; 

»aa^^^ nsing the steps of: 

copy of the object; 

by an electronic apphance of the user, each said contamer comprising an object and a user 
setofcontroim^^ 

user; 

one usage control elements being encrypted; 

for a »thonza a for n us M e o^the gjfofy^fc a^eg 1?$^^^ ^ ^ 
comprises at least a subset of the genera, set of control data, which subset comprises at 
least one of said usage control elements; 


Best Available Codv 


cfacMgnfe mpsnene Hi* ffifi^gt^atbfa^r for mgfctid%>&6Sk Wfe&ff 

^^m^^^imiim^'m^imM^si one usage control 
element of the user set of control data; and 

140. ^Mh^ssaie^ 



a^^bfogdb C b-^^e^«i^ b ^ conU . ol element) reencrypting each 
of the contained objects and its at least one usage control element and transferring the 
reconi^ejfeeatb^ic^^ltlfglllbiPr^rn 141, further comprising: 
receiving the container in a user's electronic appliance; 
141 . WmmbS fiflflfeffl^in^^csB^dgyigg ^^js^p^g^^^ of tne 

wwtotmmmv^vtote object> comprising the steps of . 

*ttf8ct provider's data processor; 

^fflgg^KPPPegftdlftfengq^sft^^^^page G f the object, whether 

^jBenb^^^^^ for usage sa . d general ^ of controi data 

<fofiip# ^tftgaialgejftiojj^esaiflo^trpl element of the user set of control data, the object 
and enabling^^^^^^^^^.^ ^.^ ^ _ 

accessible by said electronic appliance; 

containerizing the general set of control data with a copy of the object; 


eest Available Copy 


Aft§ffliy B§gfc|{ N§ : m&Md&k 
Appli§ati§fl N§ : @|MyjM 


elc 0 t Ma saa lf9to8 « 5 ecure container which is ready for transfer to a user; 

creating, in response to a request for authorization for usage of the object by ; 
user, ^r^^ ]s6 ^ m ^ m ^^ 

^^^^^^mm^^^umm^n g a general set of 

srfdlrcowaflltoehigo^s and the composite object and wherein the step of creating a user 
set of control^ 0^^^^^ MmtWm^f^ 

the encrypting step; and 

MMMINMM.^ only with . copy of consIjniem ^ 

decrypting the at to one usage control element of the user set of control 
data; 143. A method as se, forth in claim Ml. wherein the data provider's eiectronic 
appliance is connected ,„ a data network and the revest fo, authorization is recetved from 
an electronic app,ia„ce of the user, which is also connected ,„ the da, network, further 


Attorney Docket No. 032406-009 
Application No. 09/411 ,90s 


comprising the step of transferring the container through the data network to the user's 
electronic appliance. 


144. A method as set forth in claim 141, wherein the object is a composite object 
including at least two constituent objects and wherein the step of creating a general set of 
control data comprises the step of creating a respective general set of control data for each 
of the constituent objects and the composite object and wherein the step of creating a user 
set of control data comprises the step of creating a respective user set of control data for 
each of the constituent objects and the composite object. 

145. A method as defined in claim 141, comprising the further step of storing a 
copy of the user set of control data in the object provider's processor. 

146. A method as defined in claim 141, comprising the further steps of: 

receiving the container in a user's electronic appliance; 
storing the container in a storage device where it is accessible by means of the 
user's electronic appliance; 

decrypting the at least one usage control element of the user set of control 

data; 


-24- 


Best Available Copy 

dement of the ^^fifiW^b^quest for authorization for usage of the object by a 
user, a use^i^^iMej^n^^g^^^^ S^j^^^^ Qf 

dcf «^^&?^mff^imSfimet $m§kgSHWR$S^ntiol data, the object 
and enabling ^ mm ^^^ MM ^ of ^ ^ ^ ^ ^ ^ ^ 

said containerizing step; 

14? - A **« ^^^^mmmmmt of the user set of control 

data inste^Y^^cfiofHSfe^l HSMroftete mti^ffin] set of control data in 
the encrypSlfigSfe^eafiOntainer in a storage device where it is accessible by means of the 
user's electroni tgBBUa gc %efore al]owing transfer rf ^ tQ ^ ^ ^ ^ 

request fodfrMM&g tt^g^g WSl?/eeirfia^teHgnir9nifef. user set of control 
data; 

""MWNIl^ ffl¥e^§#fiP^ q ue S t for 

ele^flbfillte^^ic^^ constjtuent objects by a . s created on]y ^ 

constituent©^ ifiSd iftfif^g,«yt^ tf f gu^djfs^ ggHsfe^ ^ fedjhe usage 
defined by the at least one usage control element of the user set of control data, the object 
and enab^.tl* mS^^m^mmm^mm^e data provider's electronic 
appliance is connected to a data network and the request for authorization is received from 
an electronic appliance of the user, which is also connected to the data network, further 

-25 23 - 


Best Available Codv 

«S S£jP&S&£ ^Mmtmtt^ at least the object 
and the one or more usage of the user set of control data. 

140. A method as set forth in claim 139, comprising the further steps of updating 

u«fe^©b@S, 0 £S5 ) Sgg , and « ^ast one usage control element, reencrypting each 
0ftheC n!?sfn?e b a^ 

general set of control data comprising at least one or more usage control elements defining 
usages ofVhe oije^&fe^^ 
conditions ^^^^.c^^^^ ^ ^ ^ ^ 

storing the objlS^&S^fe^|^^ ; whcre it is accessible by means of an 

object provider's. data processor- 
containerizing means for containerizing the general set of control data with a 

copy of the ob{ec°t! iding COntro1 Conditions 

usage of the object; 
&2$8SSlB&mPWmMM te or 

u carnp„s,„ g a, ,ea SI one „ r m ^ conlrol ^ ^ fc ^ ^ 

comply with said control conditions- 
second means in said efectronic appliance.for creating, in response to a request 

forauthoriza^ 

accessible by said electronic appliance- 
comprises at least a subset of tfit general set of control data, which subset comprises at 

least one of s^S^^c^A^ ° f COatTo1 data a copy of the object; 


uesi Available Copy 


th^Sfe^a^ffined by said ai least one usage control element; 
itSfW^Sk»P^iSSg», defined by said at least one usage control element; and 

th4Pe^dryt^Jr]ieSis*a*f usage defined by said at least one usage control element. 

checking means in said electronic appliance for checking that said request for 
authori^fcn^ofMStp^s^f^^^i^^^^^^^^ q{ ^ 

cSfiim&W'lW^..Object after usage thereof. 

139. A method for controlling the usage by a user of objects so as to comply with 
predetermined conditions for usage of the objects, comprising the steps of: 

storing at least two containers in a storage device, where they are accessible 
by an electronic appliance of the user, each said container comprising an object and a user 
set of control data, which comprises at least one usage control element defining a usage of 
the object which complies with the predetermined conditions, the object and said at least 
one usage control elements being encrypted; 

decrypting the usage control elements of the user sets of control data; 
examining the usage control elements of said at least two containers to find a 

match;